2019-08-14 02:52:43 +00:00
#![ recursion_limit = " 512 " ]
2019-09-07 15:35:05 +00:00
#[ macro_use ]
pub extern crate strum_macros ;
#[ macro_use ]
pub extern crate lazy_static ;
#[ macro_use ]
pub extern crate failure ;
#[ macro_use ]
pub extern crate diesel ;
2019-03-21 01:22:31 +00:00
pub extern crate actix ;
pub extern crate actix_web ;
2019-03-23 01:42:57 +00:00
pub extern crate bcrypt ;
2019-09-07 15:35:05 +00:00
pub extern crate chrono ;
2020-03-28 22:02:49 +00:00
pub extern crate comrak ;
2019-09-07 15:35:05 +00:00
pub extern crate dotenv ;
pub extern crate jsonwebtoken ;
2019-11-02 06:43:21 +00:00
pub extern crate lettre ;
pub extern crate lettre_email ;
2019-09-07 15:35:05 +00:00
pub extern crate rand ;
2019-03-23 01:42:57 +00:00
pub extern crate regex ;
2020-03-28 22:02:49 +00:00
pub extern crate rss ;
2019-09-07 15:35:05 +00:00
pub extern crate serde ;
pub extern crate serde_json ;
2019-12-26 19:48:13 +00:00
pub extern crate sha2 ;
2019-09-07 15:35:05 +00:00
pub extern crate strum ;
2019-04-21 07:26:26 +00:00
2019-05-05 05:20:38 +00:00
pub mod api ;
2019-03-21 01:22:31 +00:00
pub mod apub ;
2019-05-03 01:34:21 +00:00
pub mod db ;
2020-04-19 22:08:25 +00:00
pub mod rate_limit ;
2019-12-31 12:55:33 +00:00
pub mod routes ;
2019-11-21 19:27:52 +00:00
pub mod schema ;
2019-12-15 16:40:55 +00:00
pub mod settings ;
2019-11-15 02:08:25 +00:00
pub mod version ;
2019-11-21 19:27:52 +00:00
pub mod websocket ;
2019-02-28 06:02:55 +00:00
2020-04-20 18:02:25 +00:00
use actix_web ::dev ::ConnectionInfo ;
2019-09-07 15:35:05 +00:00
use chrono ::{ DateTime , NaiveDateTime , Utc } ;
2019-10-30 03:35:39 +00:00
use lettre ::smtp ::authentication ::{ Credentials , Mechanism } ;
use lettre ::smtp ::extension ::ClientId ;
use lettre ::smtp ::ConnectionReuseParameters ;
2020-01-31 11:03:26 +00:00
use lettre ::{ ClientSecurity , SmtpClient , Transport } ;
2019-11-02 06:43:21 +00:00
use lettre_email ::Email ;
2020-03-13 15:08:42 +00:00
use log ::error ;
2020-03-07 23:31:13 +00:00
use percent_encoding ::{ utf8_percent_encode , NON_ALPHANUMERIC } ;
2019-11-02 06:43:21 +00:00
use rand ::distributions ::Alphanumeric ;
use rand ::{ thread_rng , Rng } ;
2019-12-30 01:29:07 +00:00
use regex ::{ Regex , RegexBuilder } ;
2020-03-07 23:31:13 +00:00
use serde ::Deserialize ;
2019-03-05 03:52:09 +00:00
2020-04-19 22:08:25 +00:00
use crate ::settings ::Settings ;
pub type ConnectionId = usize ;
pub type PostId = i32 ;
pub type CommunityId = i32 ;
pub type UserId = i32 ;
pub type IPAddr = String ;
2019-03-05 03:52:09 +00:00
pub fn to_datetime_utc ( ndt : NaiveDateTime ) -> DateTime < Utc > {
DateTime ::< Utc > ::from_utc ( ndt , Utc )
}
2019-02-28 06:02:55 +00:00
2019-03-05 03:52:09 +00:00
pub fn naive_now ( ) -> NaiveDateTime {
chrono ::prelude ::Utc ::now ( ) . naive_utc ( )
2019-02-28 06:02:55 +00:00
}
2019-09-07 15:35:05 +00:00
pub fn naive_from_unix ( time : i64 ) -> NaiveDateTime {
2019-04-15 23:12:06 +00:00
NaiveDateTime ::from_timestamp ( time , 0 )
}
2019-03-23 01:42:57 +00:00
pub fn is_email_regex ( test : & str ) -> bool {
2019-04-09 18:35:16 +00:00
EMAIL_REGEX . is_match ( test )
}
2020-05-12 19:23:48 +00:00
pub fn is_image_content_type ( test : & str ) -> Result < ( ) , failure ::Error > {
2020-06-10 15:42:20 +00:00
if attohttpc ::get ( test )
. send ( ) ?
2020-05-12 19:23:48 +00:00
. headers ( )
. get ( " Content-Type " )
. ok_or_else ( | | format_err! ( " No Content-Type header " ) ) ?
. to_str ( ) ?
. starts_with ( " image/ " )
{
Ok ( ( ) )
} else {
Err ( format_err! ( " Not an image type. " ) )
2020-05-11 23:06:12 +00:00
}
}
2019-04-09 18:35:16 +00:00
pub fn remove_slurs ( test : & str ) -> String {
SLUR_REGEX . replace_all ( test , " *removed* " ) . to_string ( )
}
2020-02-03 03:51:54 +00:00
pub fn slur_check ( test : & str ) -> Result < ( ) , Vec < & str > > {
let mut matches : Vec < & str > = SLUR_REGEX . find_iter ( test ) . map ( | mat | mat . as_str ( ) ) . collect ( ) ;
// Unique
matches . sort_unstable ( ) ;
matches . dedup ( ) ;
if matches . is_empty ( ) {
Ok ( ( ) )
} else {
Err ( matches )
}
}
pub fn slurs_vec_to_str ( slurs : Vec < & str > ) -> String {
let start = " No slurs - " ;
let combined = & slurs . join ( " , " ) ;
[ start , combined ] . concat ( )
2019-03-23 01:42:57 +00:00
}
2019-10-20 00:46:29 +00:00
pub fn extract_usernames ( test : & str ) -> Vec < & str > {
let mut matches : Vec < & str > = USERNAME_MATCHES_REGEX
. find_iter ( test )
. map ( | mat | mat . as_str ( ) )
. collect ( ) ;
// Unique
matches . sort_unstable ( ) ;
matches . dedup ( ) ;
// Remove /u/
matches . iter ( ) . map ( | t | & t [ 3 .. ] ) . collect ( )
}
2019-10-30 03:35:39 +00:00
pub fn generate_random_string ( ) -> String {
2019-11-02 06:43:21 +00:00
thread_rng ( ) . sample_iter ( & Alphanumeric ) . take ( 30 ) . collect ( )
2019-10-30 03:35:39 +00:00
}
2019-11-02 06:43:21 +00:00
pub fn send_email (
subject : & str ,
to_email : & str ,
to_username : & str ,
html : & str ,
) -> Result < ( ) , String > {
2020-04-11 18:06:04 +00:00
let email_config = Settings ::get ( ) . email . ok_or ( " no_email_setup " ) ? ;
2019-10-30 03:35:39 +00:00
let email = Email ::builder ( )
. to ( ( to_email , to_username ) )
2020-01-31 11:03:26 +00:00
. from ( email_config . smtp_from_address . to_owned ( ) )
2019-10-30 03:35:39 +00:00
. subject ( subject )
. html ( html )
. build ( )
. unwrap ( ) ;
2020-01-31 11:03:26 +00:00
let mailer = if email_config . use_tls {
SmtpClient ::new_simple ( & email_config . smtp_server ) . unwrap ( )
} else {
SmtpClient ::new ( & email_config . smtp_server , ClientSecurity ::None ) . unwrap ( )
}
2020-04-11 18:06:04 +00:00
. hello_name ( ClientId ::Domain ( Settings ::get ( ) . hostname ) )
2020-01-31 11:03:26 +00:00
. smtp_utf8 ( true )
. authentication_mechanism ( Mechanism ::Plain )
. connection_reuse ( ConnectionReuseParameters ::ReuseUnlimited ) ;
let mailer = if let ( Some ( login ) , Some ( password ) ) =
( & email_config . smtp_login , & email_config . smtp_password )
{
mailer . credentials ( Credentials ::new ( login . to_owned ( ) , password . to_owned ( ) ) )
} else {
mailer
} ;
2019-10-30 03:35:39 +00:00
2020-01-31 11:03:26 +00:00
let mut transport = mailer . transport ( ) ;
let result = transport . send ( email . into ( ) ) ;
transport . close ( ) ;
2020-01-23 01:35:20 +00:00
2019-10-30 03:35:39 +00:00
match result {
Ok ( _ ) = > Ok ( ( ) ) ,
2020-01-31 11:03:26 +00:00
Err ( e ) = > Err ( e . to_string ( ) ) ,
2019-10-30 03:35:39 +00:00
}
}
2020-03-07 23:31:13 +00:00
#[ derive(Deserialize, Debug) ]
pub struct IframelyResponse {
title : Option < String > ,
description : Option < String > ,
thumbnail_url : Option < String > ,
html : Option < String > ,
}
pub fn fetch_iframely ( url : & str ) -> Result < IframelyResponse , failure ::Error > {
2020-03-09 16:50:28 +00:00
let fetch_url = format! ( " http://iframely/oembed?url= {} " , url ) ;
2020-06-10 15:42:20 +00:00
let text : String = attohttpc ::get ( & fetch_url ) . send ( ) ? . text ( ) ? ;
2020-03-07 23:31:13 +00:00
let res : IframelyResponse = serde_json ::from_str ( & text ) ? ;
Ok ( res )
}
2020-06-10 22:22:57 +00:00
#[ derive(Deserialize, Debug, Clone) ]
pub struct PictrsResponse {
files : Vec < PictrsFile > ,
msg : String ,
}
#[ derive(Deserialize, Debug, Clone) ]
pub struct PictrsFile {
file : String ,
delete_token : String ,
2020-03-07 23:31:13 +00:00
}
2020-06-10 22:22:57 +00:00
pub fn fetch_pictrs ( image_url : & str ) -> Result < PictrsResponse , failure ::Error > {
2020-05-12 19:23:48 +00:00
is_image_content_type ( image_url ) ? ;
2020-05-11 23:06:12 +00:00
2020-03-07 23:31:13 +00:00
let fetch_url = format! (
2020-06-10 22:22:57 +00:00
" http://pictrs:8080/image/download?url={} " ,
utf8_percent_encode ( image_url , NON_ALPHANUMERIC ) // TODO this might not be needed
2020-03-07 23:31:13 +00:00
) ;
2020-06-10 15:42:20 +00:00
let text = attohttpc ::get ( & fetch_url ) . send ( ) ? . text ( ) ? ;
2020-06-10 22:22:57 +00:00
let res : PictrsResponse = serde_json ::from_str ( & text ) ? ;
if res . msg = = " ok " {
Ok ( res )
} else {
Err ( format_err! ( " {} " , & res . msg ) )
}
2020-03-07 23:31:13 +00:00
}
2020-06-10 22:22:57 +00:00
fn fetch_iframely_and_pictrs_data (
2020-03-07 23:31:13 +00:00
url : Option < String > ,
) -> (
Option < String > ,
Option < String > ,
Option < String > ,
Option < String > ,
) {
2020-05-11 18:01:10 +00:00
match & url {
Some ( url ) = > {
// Fetch iframely data
let ( iframely_title , iframely_description , iframely_thumbnail_url , iframely_html ) =
match fetch_iframely ( url ) {
Ok ( res ) = > ( res . title , res . description , res . thumbnail_url , res . html ) ,
Err ( e ) = > {
error! ( " iframely err: {} " , e ) ;
( None , None , None , None )
}
} ;
2020-06-10 22:22:57 +00:00
// Fetch pictrs thumbnail
let pictrs_thumbnail = match iframely_thumbnail_url {
Some ( iframely_thumbnail_url ) = > match fetch_pictrs ( & iframely_thumbnail_url ) {
Ok ( res ) = > Some ( res . files [ 0 ] . file . to_owned ( ) ) ,
2020-05-11 18:01:10 +00:00
Err ( e ) = > {
2020-06-10 22:22:57 +00:00
error! ( " pictrs err: {} " , e ) ;
2020-05-11 18:01:10 +00:00
None
}
} ,
2020-05-07 00:40:36 +00:00
// Try to generate a small thumbnail if iframely is not supported
2020-06-10 22:22:57 +00:00
None = > match fetch_pictrs ( & url ) {
Ok ( res ) = > Some ( res . files [ 0 ] . file . to_owned ( ) ) ,
2020-05-11 18:01:10 +00:00
Err ( e ) = > {
2020-06-10 22:22:57 +00:00
error! ( " pictrs err: {} " , e ) ;
2020-05-11 18:01:10 +00:00
None
}
} ,
} ;
(
iframely_title ,
iframely_description ,
iframely_html ,
2020-06-10 22:22:57 +00:00
pictrs_thumbnail ,
2020-05-11 18:01:10 +00:00
)
}
None = > ( None , None , None , None ) ,
}
2020-03-07 23:31:13 +00:00
}
2020-03-28 22:02:49 +00:00
pub fn markdown_to_html ( text : & str ) -> String {
comrak ::markdown_to_html ( text , & comrak ::ComrakOptions ::default ( ) )
}
2020-04-20 18:02:25 +00:00
pub fn get_ip ( conn_info : & ConnectionInfo ) -> String {
conn_info
2020-04-19 22:08:25 +00:00
. remote ( )
. unwrap_or ( " 127.0.0.1:12345 " )
. split ( ':' )
. next ( )
. unwrap_or ( " 127.0.0.1 " )
. to_string ( )
}
2020-05-28 18:07:36 +00:00
pub fn is_valid_username ( name : & str ) -> bool {
VALID_USERNAME_REGEX . is_match ( name )
}
2020-06-20 09:33:23 +00:00
pub fn is_valid_community_name ( name : & str ) -> bool {
VALID_COMMUNITY_NAME_REGEX . is_match ( name )
}
2019-03-05 03:52:09 +00:00
#[ cfg(test) ]
mod tests {
2020-05-11 23:06:12 +00:00
use crate ::{
2020-06-20 09:33:23 +00:00
extract_usernames , is_email_regex , is_image_content_type , is_valid_community_name ,
is_valid_username , remove_slurs , slur_check , slurs_vec_to_str ,
2020-05-11 23:06:12 +00:00
} ;
#[ test ]
fn test_image ( ) {
2020-05-12 19:23:48 +00:00
assert! ( is_image_content_type ( " https://1734811051.rsc.cdn77.org/data/images/full/365645/as-virus-kills-navajos-in-their-homes-tribal-women-provide-lifeline.jpg?w=600?w=650 " ) . is_ok ( ) ) ;
assert! ( is_image_content_type (
2020-05-11 23:06:12 +00:00
" https://twitter.com/BenjaminNorton/status/1259922424272957440?s=20 "
2020-05-12 19:23:48 +00:00
)
. is_err ( ) ) ;
2020-05-11 23:06:12 +00:00
}
2019-03-23 01:42:57 +00:00
2019-09-07 15:35:05 +00:00
#[ test ]
fn test_email ( ) {
2019-03-23 01:42:57 +00:00
assert! ( is_email_regex ( " gush@gmail.com " ) ) ;
assert! ( ! is_email_regex ( " nada_neutho " ) ) ;
2019-09-07 15:35:05 +00:00
}
2019-04-09 18:35:16 +00:00
2020-05-28 18:07:36 +00:00
#[ test ]
fn test_valid_register_username ( ) {
assert! ( is_valid_username ( " Hello_98 " ) ) ;
assert! ( is_valid_username ( " ten " ) ) ;
assert! ( ! is_valid_username ( " Hello-98 " ) ) ;
assert! ( ! is_valid_username ( " a " ) ) ;
assert! ( ! is_valid_username ( " " ) ) ;
}
2020-06-20 09:33:23 +00:00
#[ test ]
fn test_valid_community_name ( ) {
assert! ( is_valid_community_name ( " example " ) ) ;
assert! ( is_valid_community_name ( " example_community " ) ) ;
assert! ( ! is_valid_community_name ( " Example " ) ) ;
assert! ( ! is_valid_community_name ( " Ex " ) ) ;
assert! ( ! is_valid_community_name ( " " ) ) ;
}
2019-09-07 15:35:05 +00:00
#[ test ]
fn test_slur_filter ( ) {
2019-10-13 19:06:18 +00:00
let test =
2020-02-03 03:51:54 +00:00
" coons test dindu ladyboy tranny retardeds. Capitalized Niggerz. This is a bunch of other safe text. " ;
2019-04-09 18:35:16 +00:00
let slur_free = " No slurs here " ;
2019-09-07 15:35:05 +00:00
assert_eq! (
remove_slurs ( & test ) ,
2019-12-30 01:29:07 +00:00
" *removed* test *removed* *removed* *removed* *removed*. Capitalized *removed*. This is a bunch of other safe text. "
2019-09-07 15:35:05 +00:00
. to_string ( )
) ;
2020-02-03 03:51:54 +00:00
let has_slurs_vec = vec! [
" Niggerz " ,
" coons " ,
" dindu " ,
" ladyboy " ,
" retardeds " ,
" tranny " ,
] ;
let has_slurs_err_str = " No slurs - Niggerz, coons, dindu, ladyboy, retardeds, tranny " ;
assert_eq! ( slur_check ( test ) , Err ( has_slurs_vec ) ) ;
assert_eq! ( slur_check ( slur_free ) , Ok ( ( ) ) ) ;
if let Err ( slur_vec ) = slur_check ( test ) {
assert_eq! ( & slurs_vec_to_str ( slur_vec ) , has_slurs_err_str ) ;
}
2019-09-07 15:35:05 +00:00
}
2019-10-20 00:46:29 +00:00
#[ test ]
fn test_extract_usernames ( ) {
let usernames = extract_usernames ( " this is a user mention for [/u/testme](/u/testme) and thats all. Oh [/u/another](/u/another) user. And the first again [/u/testme](/u/testme) okay " ) ;
let expected = vec! [ " another " , " testme " ] ;
assert_eq! ( usernames , expected ) ;
}
2019-10-30 03:35:39 +00:00
2020-03-07 23:31:13 +00:00
// These helped with testing
// #[test]
// fn test_iframely() {
// let res = fetch_iframely("https://www.redspark.nu/?p=15341");
// assert!(res.is_ok());
// }
// #[test]
// fn test_pictshare() {
// let res = fetch_pictshare("https://upload.wikimedia.org/wikipedia/en/2/27/The_Mandalorian_logo.jpg");
// assert!(res.is_ok());
// let res_other = fetch_pictshare("https://upload.wikimedia.org/wikipedia/en/2/27/The_Mandalorian_logo.jpgaoeu");
// assert!(res_other.is_err());
// }
2019-10-30 03:35:39 +00:00
// #[test]
// fn test_send_email() {
// let result = send_email("not a subject", "test_email@gmail.com", "ur user", "<h1>HI there</h1>");
// assert!(result.is_ok());
// }
2019-04-09 18:35:16 +00:00
}
lazy_static! {
static ref EMAIL_REGEX : Regex = Regex ::new ( r "^[a-zA-Z0-9.!#$%&’ *+/=?^_`{|}~-]+@[a-zA-Z0-9-]+(?:\.[a-zA-Z0-9-]+)*$" ) . unwrap ( ) ;
2020-01-20 22:12:23 +00:00
static ref SLUR_REGEX : Regex = RegexBuilder ::new ( r "(fag(g|got|tard)?|maricos?|cock\s?sucker(s|ing)?|nig(\b|g?(a|er)?(s|z)?)\b|dindu(s?)|mudslime?s?|kikes?|mongoloids?|towel\s*heads?|\bspi(c|k)s?\b|\bchinks?|niglets?|beaners?|\bnips?\b|\bcoons?\b|jungle\s*bunn(y|ies?)|jigg?aboo?s?|\bpakis?\b|rag\s*heads?|gooks?|cunts?|bitch(es|ing|y)?|puss(y|ies?)|twats?|feminazis?|whor(es?|ing)|\bslut(s|t?y)?|\btrann?(y|ies?)|ladyboy(s?)|\b(b|re|r)tard(ed)?s?)" ) . case_insensitive ( true ) . build ( ) . unwrap ( ) ;
2019-10-20 00:46:29 +00:00
static ref USERNAME_MATCHES_REGEX : Regex = Regex ::new ( r "/u/[a-zA-Z][0-9a-zA-Z_]*" ) . unwrap ( ) ;
2020-05-28 18:07:36 +00:00
static ref VALID_USERNAME_REGEX : Regex = Regex ::new ( r "^[a-zA-Z0-9_]{3,20}$" ) . unwrap ( ) ;
2020-06-20 09:33:23 +00:00
static ref VALID_COMMUNITY_NAME_REGEX : Regex = Regex ::new ( r "^[a-z0-9_]{3,20}$" ) . unwrap ( ) ;
2019-03-23 01:42:57 +00:00
}